Stay current with the latest technology tips, relevant news, and important updates.View Blog Posts
Learn how we’ve helped customers implement digital technology and achieve results.View Case Studies
Explore our extensive collection of digital and interactive resources.See Resources
How BlackMesh Helps CMS Product Owners Keep Things Secure and Compliant
Open source content management systems like Drupal, Magento and WordPress are popular options for companies today because they make it easier for IT and development teams to integrate various emerging technologies—like workflow automation tools, Kubernetes and public cloud environments—into their web applications. These open source platforms integrate new capabilities that improve the digital experience for end users or add efficiencies to internal workflows.
On-Demand Webinar: Automated & On-Demand Infra for Secure Environments
Technical teams serving the public sector are asked to interact with more non-technical stakeholders than ever before. Developers facing this increased demand for visibility into the development process must nevertheless maintain security and compliance. Tugboat enables teams to create on-demand infrastructure for every Git branch or tag for end-to-end visibility throughout the entire development process. As a trusted partner of Tugboat, Contegix supports Tugboat on our FedRAMP compliant platform, allowing developers access to secure tooling and environments.
The Benefits of a Hosting Provider to Ensure Secure, Compliant WordPress Sites
WordPress is one of the most commonly used content management systems (CMSs) today, and powers about 40% of all websites, including some of the internet’s most popular webpages like The New Yorker, Reuters and Skype. This is due in part to the open source platform’s versatility: With more than 58,000 plug-ins and thousands of pre-built themes to choose from, WordPress users can build effective, customized web applications to meet their specific needs.
How To Continuously Implement Drupal Security Updates
Keeping on top of updates to internet software can be a laborious task for IT teams. Though critical to the security of a website or application, the processes—from tracking new releases to scheduling and running the updates—can be both time-consuming and tedious.
Webinar: Top 5 ways to get the most out of Jira Service Management
Are you just getting started with Jira Service Management? Trying to decide what features you need? We have implemented and customized dozens of Atlassian instances and would like to share with you a few of our favorite features and how we apply them. This webinar will give you a perspective of select features and the configurable options available to ensure your organization is using them efficiently.
To Block FLoC or not? Google’s new tracking technology
A lot of interest has been generated recently on the implications of Google’s new tracking technology – Federated Learning of Cohorts (FLoC). In brief, Google is trying to reduce its dependency on cookies (or eliminate them) and instead allow the browser to assign each user tracked into an “interest cohort” – which is essentially a tag for a group of people that all share similar interests. As a user browses the web, the browser summarizes all activity and assigns a cohort. Advertisers are then able to target specific cohorts.
How to Maintain a Successful Agile Development Process with Atlassian Solutions
Agile software development has become the preferred development technique among tech leaders today. Unlike traditional methods like waterfall software development, which focuses on creating tight and exact stages, agile takes a more modern, iterative approach—allowing teams to continually revisit, examine and adjust their development techniques to deliver applications that meet business requirements effectively and quickly.
Get real-time protection to help prevent the growing number of ransomware attacks
Earlier this month the Colonial Pipeline, a 5,500 mile pipeline that supplies upwards of 45% of the gasoline to the east coast of the United States was breached and halted due to a ransomware attack. With no recovery mechanism in place, the company was forced to pay nearly $5 million dollars to regain control of their infrastructure. The attack is a harsh reminder for many organizations of the growing threat of cyber-attacks and ransomware. Sadly, hacker groups such as “DarkSide” are only increasing in numbers and the threat of ransomware is only growing in complexity and scale.